2019 IEEE Globecom Workshops (GC Wkshps)最新文献

筛选
英文 中文
Security-Reliability Tradeoff Analysis of Spectrum-Sharing Aided Satellite-Terrestrial Networks 频谱共享辅助星-地网络安全-可靠性权衡分析
2019 IEEE Globecom Workshops (GC Wkshps) Pub Date : 2019-12-01 DOI: 10.1109/GCWkshps45667.2019.9024465
Xiaojin Ding, Gengxin Zhang, Dexin Qu, Tiecheng Song
{"title":"Security-Reliability Tradeoff Analysis of Spectrum-Sharing Aided Satellite-Terrestrial Networks","authors":"Xiaojin Ding, Gengxin Zhang, Dexin Qu, Tiecheng Song","doi":"10.1109/GCWkshps45667.2019.9024465","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024465","url":null,"abstract":"In this paper, we investigate the physical-layer security of a spectrum-sharing aided satellite-terrestrial integrated network comprised of a pair of satellite system and terrestrial system, which can utilize the shared spectrum in the presence of an eavesdropper. We propose a specifically designed satellite scheduling scheme to guarantee wireless transmission of the satellite system against eavesdropping attacks in the face of co-channel interference generated by the terrestrial communication system, where the specifically designed satellite scheduling scheme is represented by multi-satellite scheduling (MSS). We analyze the security-reliability tradeoff (SRT) of the MSS scheme, where the security and the reliability are characterized by the intercept probability and the outage probability, respectively. For comparison purposes, we also provide the SRT analysis of the round-robin satellite scheduling (RSS) scheme. In addition, numerical SRT results demonstrate that the proposed MSS scheme significantly outperform the RSS scheme in terms of their SRT.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125408088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Real-Time Network Traffic Identifier for Open 5G/B5G Networks via Prototype Analysis 基于原型分析的开放5G/B5G网络实时网络流量标识
2019 IEEE Globecom Workshops (GC Wkshps) Pub Date : 2019-12-01 DOI: 10.1109/GCWkshps45667.2019.9024421
Zhichao Zou, Shunqing Zhang, Shugong Xu, Shan Cao
{"title":"A Real-Time Network Traffic Identifier for Open 5G/B5G Networks via Prototype Analysis","authors":"Zhichao Zou, Shunqing Zhang, Shugong Xu, Shan Cao","doi":"10.1109/GCWkshps45667.2019.9024421","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024421","url":null,"abstract":"Nowadays real-time traffic occupies lots of network resources, thus identification and analysis for this network traffic becomes urgent for operator and commercial company. With the identified traffic types, quality of experience (QoE) monitoring and optimization, user behavior analysis and network resource allocation are more beneficial for open 5G/Beyond 5G (5G/B5G) networks. Exiting studies usually adopt transport or application layer information to identify traffic, while we jointly consider them simultaneously to achieve general purpose identifier. Besides, we also analyze the flow-based features to reduce the corresponding complexity for low-complexity implementation. Based on anatomy of network traffic identification, we propose a traffic type identification framework for real-time traffic. In mainstream voice over Internet protocol (VoIP) call and video streaming services, the proposed method can achieve as much as 30% identification accuracy improvement and have more than 20% reduction in terms of the identification delay if compared with other conventional schemes.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125421300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
First Experimental Ambient Backscatter Communication Using a Compact Reconfigurable Tag Antenna 首次使用紧凑型可重构标签天线的环境后向散射通信实验
2019 IEEE Globecom Workshops (GC Wkshps) Pub Date : 2019-12-01 DOI: 10.1109/GCWkshps45667.2019.9024698
Y. Kokar, D. P. Huy, Romain Fara, K. Rachedi, A. Ourir, J. Rosny, M. D. Renzo, Jean-Christophe Prévotet, M. Hélard
{"title":"First Experimental Ambient Backscatter Communication Using a Compact Reconfigurable Tag Antenna","authors":"Y. Kokar, D. P. Huy, Romain Fara, K. Rachedi, A. Ourir, J. Rosny, M. D. Renzo, Jean-Christophe Prévotet, M. Hélard","doi":"10.1109/GCWkshps45667.2019.9024698","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024698","url":null,"abstract":"Ambient backscatter communications have emerged as a promising technology for a sustainable development of the Internet of Things (IoT). In such system, a radio frequency (RF) tag can transmit data to a receiver without battery and without generating any new RF wave, just by backscattering the incident RF wave originated by an ambient RF source. The simplest tag is a dipole that is either in an absorbing mode or in reflecting mode to send \"0\" or \"1\", and thus leads to a modulation order of 2. Previous solutions to reach higher modulation order, so as to achieve higher data rate, are based on antenna arrays. However, such solutions are not suitable for connected objects, due to their sizes. In this paper, for the first time, we propose a new tag that uses a compact antenna with reconfigurable radiation patterns to provide a high modulation order. We present experimental bit error rate measurements obtained with an experimental test-bed and two tag antennas, both providing 4 states and thus being able to convey 2 bits per symbol. These measurements show that the performance improves with increasing number of receive antennas, and lead to the conclusion that a tag antenna with low cross-correlations between reconfigurable radiation patterns is suitable for backscattering applications in IoT.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126599082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Joint Channel Equalization and Tracking for V2X Communications Using SC-FDE Schemes 基于SC-FDE方案的V2X通信联合信道均衡与跟踪
2019 IEEE Globecom Workshops (GC Wkshps) Pub Date : 2019-12-01 DOI: 10.1109/GCWkshps45667.2019.9024432
P. Pedrosa, R. Dinis, D. Castanheira, Adão Silva, A. Gameiro
{"title":"Joint Channel Equalization and Tracking for V2X Communications Using SC-FDE Schemes","authors":"P. Pedrosa, R. Dinis, D. Castanheira, Adão Silva, A. Gameiro","doi":"10.1109/GCWkshps45667.2019.9024432","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024432","url":null,"abstract":"In this paper we consider the use of a single- carrier with frequency-domain equalization (SC-FDE) scheme for vehicle-to-everything (V2X) communications. To cope with the doubly-selective nature of the V2X channel we propose a receiver structure for the joint channel equalization and tracking. We use a low-complexity iterative frequency-domain equalizer based on the iterative block decision-feedback equalization (IB-DFE) concept for the channel equalization and an extended Kalman filter (EKF) for the channel tracking. The tracking procedure works by, first, observing (estimating) the channel state using training symbols and then predicting the channel state using a state-transition model during the transmission of the data symbols. Alternatively, decision-directed channel estimation also can be used, resulting in improved performance.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127347301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Efficient Key-Aggregate Keyword Searchable Encryption for Data Sharing in Cloud Storage 面向云存储数据共享的高效Key-Aggregate关键字可搜索加密
2019 IEEE Globecom Workshops (GC Wkshps) Pub Date : 2019-12-01 DOI: 10.1109/GCWkshps45667.2019.9024540
Xuqi Wang, Yu Xie, Xiangguo Cheng, Zhengtao Jiang
{"title":"An Efficient Key-Aggregate Keyword Searchable Encryption for Data Sharing in Cloud Storage","authors":"Xuqi Wang, Yu Xie, Xiangguo Cheng, Zhengtao Jiang","doi":"10.1109/GCWkshps45667.2019.9024540","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024540","url":null,"abstract":"One key focus of cloud storage is keyword search on encrypted data. In a cloud-based secure data sharing system, users need to search keywords on encrypted data in order to data confidentiality and query privacy. Moreover, a large number of trapdoors should be generated by users with his/her keys and submitted to the cloud. Some researches on searchable encryption with key-aggregate have been conducted in recent years, which shortened the number of keys and trapdoors to a constant. However, the computational overhead and communication costs are largely neglected in the literature. In this paper, we propose an efficient key-aggregate keyword searchable encryption (eKAKSE) scheme. Generally, this scheme does not need to generate substantial parameters when the system is established. It dramatically reduces the computational overhead in the case of resisting the eavesdropping problem. We formulate the security definitions for eKAKSE and prove its security. The simulation results show that the computational overhead of the proposed scheme is more efficient than that of other schemes.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125236485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Capacity Analysis of Multi-Pair Orbital Angular Momentum Interference Networks 多对轨道角动量干涉网络容量分析
2019 IEEE Globecom Workshops (GC Wkshps) Pub Date : 2019-12-01 DOI: 10.1109/GCWkshps45667.2019.9024376
Woong Son, Howon Lee, B. Jung
{"title":"Capacity Analysis of Multi-Pair Orbital Angular Momentum Interference Networks","authors":"Woong Son, Howon Lee, B. Jung","doi":"10.1109/GCWkshps45667.2019.9024376","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024376","url":null,"abstract":"In this paper, we investigate a multi-pair orbital angular momentum (OAM) interference network adopting mode- division multiplexing (MDM) at each transmitter, where multiple transmitter-receiver pairs exploit the same multiple OAM modes. Even though many previous studies on the OAM-MDM exist in literature, they only focused on a single transmitter-receiver pair and did not consider the inter-pair interference. In practice, wireless fronthaul and backhaul links reuse the same frequency band and they may interfere with each other. We first mathematically characterize the Laguerre-Gaussian (LG) beam-based OAM wireless channel and then analyze the channel capacity of the multi-pair OAM interference channel. It is worth noting that this is the first theoretical result in literature. Through extensive computer simulations, we validate the channel capacity of the multi-pair OAM-MDM interference channel by considering the interference among different OAM beams according to various system parameters such as the number of OAM modes, the distance between the transmitter and receiver, the distance between adjacent transmit antennas, the waist of the OAM beams, etc.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124494878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
QR Approximation for Fronthaul Compression in Uplink Massive MIMO 面向上行海量MIMO的前传压缩QR逼近
2019 IEEE Globecom Workshops (GC Wkshps) Pub Date : 2019-12-01 DOI: 10.1109/GCWkshps45667.2019.9024609
P. Aswathylakshmi, R. Ganti
{"title":"QR Approximation for Fronthaul Compression in Uplink Massive MIMO","authors":"P. Aswathylakshmi, R. Ganti","doi":"10.1109/GCWkshps45667.2019.9024609","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024609","url":null,"abstract":"Massive MIMO's immense potential to expand the capacity of base stations also comes with the caveat of requiring tremendous processing power. This favours a centralized radio access network (C-RAN) architecture that concentrates the processing power at a common baseband unit (BBU) connected to multiple remote radio heads (RRH) via fronthaul links. The large bandwidths of 5G make the fronthaul data rate a major bottleneck. Since the number of active users in a massive MIMO system is much smaller than the number of antennas, we propose a dimension reduction scheme based on QR approximation for fronthaul data compression. Link level simulations show that the proposed method achieves more than 17Ã- compression while also improving the error performance of the system through denoising.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122806450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Bootstrapping Security Configuration for IoT Devices on Networks with TLS Inspection 基于TLS检测的物联网设备自启动安全配置
2019 IEEE Globecom Workshops (GC Wkshps) Pub Date : 2019-12-01 DOI: 10.1109/GCWkshps45667.2019.9024325
V. Danilchenko, Matthew S. Theobald, Daniel Cohen
{"title":"Bootstrapping Security Configuration for IoT Devices on Networks with TLS Inspection","authors":"V. Danilchenko, Matthew S. Theobald, Daniel Cohen","doi":"10.1109/GCWkshps45667.2019.9024325","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024325","url":null,"abstract":"In the modern security-conscious world, Deep Packet Inspection (DPI) proxies are increasingly often used on industrial and enterprise networks to perform TLS unwrapping on all outbound connections. However, enabling TLS unwrapping requires local devices to have the DPI proxy Certificate Authority certificates installed. While for conventional computing devices this is addressed via enterprise management, it's a difficult problem for Internet of Things (\"IoT\") devices which are generally not under enterprise management, and may not even be capable of it due to their resource-constrained nature. Thus, for typical IoT devices, being installed on a network with DPI requires either manual device configuration or custom DPI proxy configuration, both of which solutions have significant shortcomings. This poses a serious challenge to the deployment of IoT devices on DPI-enabled intranets. The authors propose a solution to this problem: a method of installing on IoT devices the CA certificates for DPI proxy CAs, as well as other security configuration (\"security bootstrapping\"). The proposed solution respects the DPI policies, while allowing the commissioning of IoT and IIoT devices without the need for additional manual configuration either at device scope or at network scope. This is accomplished by performing the bootstrap operation over unsecured connection, and downloading certificates using TLS validation at application level. The resulting solution is light-weight and secure, yet does not require validation of the DPI proxy's CA certificates in order to perform the security bootstrapping, thus avoiding the chicken-and-egg problem inherent in using TLS on DPI-enabled intranets.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122182276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reduced-Complexity Quasi-Optimum Detection for MIMO-OFDM Signals with Strong Nonlinear Distortion 具有强非线性失真的MIMO-OFDM信号的低复杂度准最优检测
2019 IEEE Globecom Workshops (GC Wkshps) Pub Date : 2019-12-01 DOI: 10.1109/GCWkshps45667.2019.9024620
J. Felix, João Guerreiro, R. Dinis, P. Montezuma
{"title":"Reduced-Complexity Quasi-Optimum Detection for MIMO-OFDM Signals with Strong Nonlinear Distortion","authors":"J. Felix, João Guerreiro, R. Dinis, P. Montezuma","doi":"10.1109/GCWkshps45667.2019.9024620","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024620","url":null,"abstract":"MIMO-OFDM (Multi-Input, Multi-Output Orthogonal Frequency Division Multiplexing) signals are very prone to nonlinear distortion effects, which can lead to high irreducible error floors. This can be particularly serious when low-resolution quantizers are employed. In this paper we consider MIMO-OFDM schemes with low- resolution quantizers. It is shown that, although this leads to strong nonlinear distortion effects and very poor performance when conventional receivers are employed, this is not necessarily the case when optimum receivers are considered. Since the complexity of the optimum receiver for MIMO-OFDM is prohibitively high, we develop sub- optimum receivers with moderate complexity. It is shown that these receivers can have huge performance gains when the nonlinear distortion levels are high, eliminating irreducible error floors and even outperforming linear MIMO-OFDM schemes in some scenarios.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131818706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Partitioned Controller Placement in SDWANs for Reliability Maximization with Latency Constraints 基于延迟约束的sdwan可靠性最大化分区控制器布局
2019 IEEE Globecom Workshops (GC Wkshps) Pub Date : 2019-12-01 DOI: 10.1109/GCWkshps45667.2019.9024372
K. Yang, Bangning Zhang, D. Guo, Min Lin, Tomaso de Cola
{"title":"Partitioned Controller Placement in SDWANs for Reliability Maximization with Latency Constraints","authors":"K. Yang, Bangning Zhang, D. Guo, Min Lin, Tomaso de Cola","doi":"10.1109/GCWkshps45667.2019.9024372","DOIUrl":"https://doi.org/10.1109/GCWkshps45667.2019.9024372","url":null,"abstract":"The separation of the control plane from the data plane has made the novel paradigm, Software-Defined Networking (SDN), available in both small-scale and large-scale networks. Unlike small-scale networks with merely one controller for deployment, employing multiple controllers is essential to meet the requirements of reliability and scalability in Software- Defined WANs (SDWANs). However, the occurrence of the node or link failures in the control plane may severely deteriorate the system performance. Therefore, how to determine the number and locations of the distributed controllers in SDWANs for enhancing network reliability with propagation latency constraints worth in-depth study. In this paper, we formulate the controller placement problem in SDWANs mathematically and propose a heuristic algorithm with low computational complexity to address it. By incorporating the centroid-based network partition scheme, we further ameliorate the CPP for maximizing reliability with latency constraints. Experiments are performed on real network topologies to validate the effectiveness of our approach for controller placement problem in SDWANs.","PeriodicalId":210825,"journal":{"name":"2019 IEEE Globecom Workshops (GC Wkshps)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131855199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信